NOTICE: Log4j zero-day exploit may affect DSpace 7.x (only). How to patch yourself quickly.

237 views
Skip to first unread message

Tim Donohue

unread,
Dec 10, 2021, 11:09:43 AM12/10/21
to DSpace Community
All,

As many of you may have seen, a critical vulnerability has been discovered in log4j and announced in the last day. Details are at: https://www.lunasec.io/docs/blog/log4j-zero-day/

If you are running DSpace 6.x or below, you are not​ be impacted by this vulnerability, as DSpace 6.x and below still rely on log4j v1 (and they don't use the JMS Appender which is where the vulnerability can be exploited with log4j v1).

If you are running DSpace 7.x, YOU MAY BE IMPACTED.  A few possible known quick fixes are available.
We'd highly recommend taking one of the following steps immediately if you are running DSpace 7.x in Production.

If you have additional questions, feel free to email secu...@dspace.org (which emails all DSpace Committers). If you have a public suggestion, feel free to send it to this list to help other DSpace users who may be impacted.

Tim

--

Tim Donohue

Technical Lead, DSpace

tim.d...@lyrasis.org

Lyrasis.org | DSpace.org



throwaway 8768629769

unread,
Dec 12, 2021, 9:21:29 AM12/12/21
to DSpace Community
Hello,

I see the following pom.xml files:

./dspace-api/pom.xml
./dspace-oai/pom.xml
./dspace-rdf/pom.xml
./dspace-rest/pom.xml
./dspace-server-webapp/pom.xml
./dspace-services/pom.xml
./dspace-sword/pom.xml
./dspace-swordv2/pom.xml
./dspace/modules/additions/pom.xml
./dspace/modules/pom.xml
./dspace/modules/rest/pom.xml
./dspace/modules/server/pom.xml
./dspace/pom.xml
./pom.xml

But none in /src/pom.xml. Which file ist the correct one for the fix?

Kind regards,
Mirko Grothe

throwaway 8768629769

unread,
Dec 12, 2021, 9:21:29 AM12/12/21
to DSpace Community
Nvm I just realised you meant the dspace-src directory, not the src directory inside the dspace-src directory.

Kind regards,
Mirko Grothe

Tim Donohue schrieb am Freitag, 10. Dezember 2021 um 17:09:43 UTC+1:

Tim Donohue

unread,
Dec 13, 2021, 3:37:08 PM12/13/21
to DSpace Community
An update on this advice:  PLEASE UPGRADE YOUR DSpace 7.x BACKEND (or patch it).  We've learned more about the log4j vulnerability, and we no longer believe our other prior advice provides you with full protection.
Reply all
Reply to author
Forward
0 new messages